1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
5

​________________________ are the main forms of direct and digital marketing. A. Mobile​ marketing, social media​ marketing, and

direct mail marketing B. Online​ marketing, direct response television​ marketing, and mobile marketing C. Online​ marketing, social media​ marketing, and telemarketing D. Traditional direct marketing tools and new digital marketing tools E. Social media​ marketing, telemarketing, and kiosk marketing
Computers and Technology
1 answer:
exis [7]3 years ago
8 0

Answer:

A is the answer: Mobile marketing, Social media marketing and direct mail marketing

Explanation:

Option A is most likely correct because it is an intersection of both direct and digital marketing.

Option B is not the answer as direct response television marketing is listed

Option C is not the answer because online marketing and social media marketing belong to digital marketing while telemarketing belong the direct marketing

Option D is also not the answer as it just list the general category of marketing tools

Option E look like a good option but among the listed forms Social media marketing belong to digital marketing while telemarketing and kiosk marketing belong to digital marketing.

You might be interested in
What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
vivado [14]
The acronym RFID (Radio Frequency Identification) describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrigerators, automobile components, light bulbs, and industrial control devices. RFIDs are  battery-powered sensors that gather and transmit data to a reading device. Some sensor based technologies are  scanning electron microscopes, LiDAR,radar, GPS, x-ray, sonar, infrared and seismic.



5 0
3 years ago
What is the output <br>this is a computer science question ​
olga2289 [7]

Answer:

output is a last step of IPO cycle in which we can get meaningful information through output devices

6 0
3 years ago
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
What is 30 x 30 x 30 x 30
frez [133]
810,000 i asked siri
4 0
3 years ago
Read 2 more answers
By applying styles,____ formats are being applied each time?
Ray Of Light [21]
(A) the same, by applying styles the same formats are being applied each time.
8 0
4 years ago
Other questions:
  • Before responding to an e-mail from another student in an online course, a student should
    13·2 answers
  • Why it is so important for all application builders to always check data received from unknown sources, such as web applications
    5·1 answer
  • Which of the following statements about take home pay is TRUE?
    10·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat
    15·2 answers
  • Explain what led to the invention of lasers
    7·1 answer
  • Different search engines available on the internet​
    7·1 answer
  • Does anyone have 2.19.4 Guess a number 2.0 code for codehs?
    8·1 answer
  • Write a pseudocode to calculate the volume of a cylinder​
    12·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!